{"id":28687,"date":"2016-09-15T14:30:16","date_gmt":"2016-09-15T04:30:16","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=28687"},"modified":"2016-09-15T12:13:48","modified_gmt":"2016-09-15T02:13:48","slug":"securing-democracy-cybersecurity-digital-voting-us-election","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/","title":{"rendered":"Securing democracy: the cybersecurity of digital voting in the US election"},"content":{"rendered":"
\"\"<\/figure>\n

Cybersecurity continues to be a prominent issue in the US election race. An FBI bulletin, uncovered<\/a> two weeks ago, reveals that the Bureau has been investigating recent hacking attempts on two state election websites. The hackers, suspected to be agents of a foreign state, targeted<\/a> voter databases in Arizona and Illinois, accessing up to 200,000 personal voter records.<\/p>\n

It\u2019s only been three months since security firm Crowdstrike held<\/a> two Russian groups responsible for the high-profile hack of the Democratic National Committee (DNC) networks. Wikileaks later published<\/a> almost 20,000 DNC emails, and Romanian hacker Guccifer 2.0 released<\/a> DNC opposition research on Trump\u2014both ostensibly obtained from the breach. The incident had a significant impact on the Democratic Party and its convention, and was deemed an act of kompromat<\/a>\u2014the Russian practice of using compromising information to smear officials and influence events.<\/p>\n

Gaining access to voter databases isn\u2019t particularly ground breaking<\/a>: the information isn\u2019t well protected and some is actually available for purchase from platforms such as NationBuilder.com<\/a> or VoterRecords.com<\/a>. But the incident, preceded as it was by the DNC hack the breach<\/a> of the Democratic Congressional Campaign Committee and a further DNC document dump<\/a> by Guccifer this week, has intensified concern over of the fragility of computer systems and the interest foreign hackers have in meddling with them.<\/p>\n

Specifically, there\u2019s concern around the security of the voting machines themselves. Following the troubled 2000 presidential election count, there was a move to modernise<\/a> parts of the US voting process from paper punching to digital machines. Unfortunately, changes took place without much consideration of security and systems haven\u2019t been diligently upgraded since installation. The Institute for Critical Infrastructure Technology laments<\/a>\u00a0(PDF) that as a result, most voting machines are \u2018less secure than a modern children\u2019s toy\u2019.<\/p>\n

Computer science professor Ed Felten tried to bring attention to this weakness over 10 years ago, successfully installing<\/a> vote-altering malware to an e-voting machine in such a way that digital forensics would find no trace. Such security flaws remain today, with Felten\u2019s Princeton associate Andrew Appel recently taking only minutes to demonstrate<\/a> his ability to remodel a voting machine\u2019s circuitry to sabotage vote counting. That same model machine is still used in New Jersey, Virginia, Louisiana and Pennsylvania.<\/p>\n

Alternatively, hackers could compromise the voter access card used by citizens to cast their ballot at an e-voting machine. At the Black Hat hacking conference last month, the Symantec stall demonstrated<\/a> that, if accessed ahead of time, the cards can be reprogrammed to allow an individual to fraudulently submit hundreds of votes at a time.<\/p>\n

The integrity of voting data remains vulnerable outside the booth. Hackers could exploit the network connections<\/a> that communicate the votes to the central database server (where election results are collated), intercepting and modifying the unencrypted data in transit. Or simple manipulation of voter databases, like those accessed in Arizona and Illinois, could lead to targeted disenfranchisement<\/a> on Election Day, generating panic and a loss of confidence in the process.<\/p>\n

While Department of Homeland Security (DHS) Secretary Jeh Johnson maintains<\/a> that his organisation doesn\u2019t have reason to believe there\u2019s a specific threat posed to the election, he has nonetheless proposed measures to mitigate any risk. DHS has offered<\/a> to provide states with federal cyber security experts to review voting systems for bugs and vulnerabilities. However such moves have been painted<\/a> as unconstitutional government overreach and several vital swing-states, such as Georgia and Pennsylvania, declined the offer<\/a> in favour of reliance on in-house security capabilities.<\/p>\n

Generating a tangible impact on an election outcome remains challenging, given the highly decentralised nature<\/a> of voting networks and the fact that 75% of votes<\/a> still leave a verifiable paper trail. However, lax cyber security standards could still allow doubt to be cast on an election outcome\u2014a dangerous recipe in a potentially tight race and given Trump\u2019s public conviction<\/a> that the election is likely to be rigged. Disturbingly, the current system makes it almost impossible to verify the authenticity of the results as 15 out of 50 states don\u2019t create paper voting records<\/a> in all their jurisdictions, and several states, including Georgia, South Carolina and New Jersey, keep no paper trail of votes whatsoever.<\/p>\n

Either way, the high-profile debate around digital voting has certainly highlighted the strategic significance of election systems as national security assets. As Rice professor Dan Wallach advocates<\/a>, election security is a national security concern. In this vein, Johnson recently suggested<\/a> digital voting systems be rebranded as critical national infrastructure. Putting election infrastructure in the same category as national power grids and water supply systems would allow DHS to maintain tighter controls and improve the transparency of voting system security, which has been lacking<\/a> to date.<\/p>\n

It\u2019s too late to completely remedy the situation for the 2016 US presidential election, but at a minimum some form of paper trail evidence should be mandated for digital votes. Elevating the security of electoral systems to the federal level may be the only way to enforce a bare minimum security standard before polling day and facilitate more robust risk mitigation into the future.<\/p>\n

Debates are underway around the possibility of e-voting<\/a> in Australia\u2019s next election. These discussions must be informed by an awareness that the ability to secure and corroborate votes is a pre-requisite for going digital. The US experience demonstrates that electronic voting has to be done correctly or not at all, and if it\u2019s pursued, it must be prioritised as an extension of critical national infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"

Cybersecurity continues to be a prominent issue in the US election race. An FBI bulletin, uncovered two weeks ago, reveals that the Bureau has been investigating recent hacking attempts on two state election websites. The …<\/p>\n","protected":false},"author":390,"featured_media":28688,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,1428,83,728,843],"class_list":["post-28687","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-donald-trump","tag-elections","tag-hacking","tag-hillary-clinton"],"acf":[],"yoast_head":"\nSecuring democracy: the cybersecurity of digital voting in the US election | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing democracy: the cybersecurity of digital voting in the US election | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity continues to be a prominent issue in the US election race. An FBI bulletin, uncovered two weeks ago, reveals that the Bureau has been investigating recent hacking attempts on two state election websites. The ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-15T04:30:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-09-15T02:13:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/323474324_7a0e00b089_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/323474324_7a0e00b089_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/323474324_7a0e00b089_z.jpg\",\"width\":640,\"height\":480},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/\",\"name\":\"Securing democracy: the cybersecurity of digital voting in the US election | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/#primaryimage\"},\"datePublished\":\"2016-09-15T04:30:16+00:00\",\"dateModified\":\"2016-09-15T02:13:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing democracy: the cybersecurity of digital voting in the US election\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing democracy: the cybersecurity of digital voting in the US election | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/","og_locale":"en_US","og_type":"article","og_title":"Securing democracy: the cybersecurity of digital voting in the US election | The Strategist","og_description":"Cybersecurity continues to be a prominent issue in the US election race. An FBI bulletin, uncovered two weeks ago, reveals that the Bureau has been investigating recent hacking attempts on two state election websites. The ...","og_url":"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-09-15T04:30:16+00:00","article_modified_time":"2016-09-15T02:13:48+00:00","og_image":[{"width":640,"height":480,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/323474324_7a0e00b089_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/323474324_7a0e00b089_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/09\/323474324_7a0e00b089_z.jpg","width":640,"height":480},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/","url":"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/","name":"Securing democracy: the cybersecurity of digital voting in the US election | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/#primaryimage"},"datePublished":"2016-09-15T04:30:16+00:00","dateModified":"2016-09-15T02:13:48+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/securing-democracy-cybersecurity-digital-voting-us-election\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Securing democracy: the cybersecurity of digital voting in the US election"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28687"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=28687"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28687\/revisions"}],"predecessor-version":[{"id":28691,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/28687\/revisions\/28691"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/28688"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=28687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=28687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=28687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}